POPULARITY
In this episode of Partnerships Unraveled, we sit down with Norman Guadagno, former CMO of Mimecast and marketing leader with deep experience in B2B tech, cybersecurity, and partner-led growth. Norman shares why marketing teams continue to prioritize direct sales over channel partners and what needs to change.
Join Staffbase SVP & GM of the Americas David Maffei as he sits down with transformational marketing leader Norman Guadagno to explore the pivotal role communication plays in driving successful business transformations. From aligning teams across sales and marketing to embracing AI as a communication tool, Norman shares actionable strategies and lessons from his transformative work at companies like Mimecast and Carbonite. This episode dives into the complexity of organizational change, the importance of trust and transparency, and how storytelling can drive alignment and engagement. Whether you're navigating a business transformation or adapting to the evolving landscape of AI-driven communication, this conversation is packed with insights to inspire action.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: SEC fines tech firms for downplaying the Solarwinds hacks Anonymous Sudan still looks and quacks like a Russian duck Apple proposes max 10 day TLS certificate life Oopsie! Microsoft loses a bunch of cloud logs Veeam and Fortinet are bad and should feel bad North Koreans are good (at hacking) And much, much more. This week's episode is sponsored by Proofpoint. Chief Strategy Officer Ryan Kalember joins to talk about their work keeping up with prolific threat actor SocGholish. This episode is also available on Youtube. Show notes Four cyber companies fined for SolarWinds disclosure failures U.S. charges Sudanese men with running powerful cyberattack-for-hire gang Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals | WIRED Risky Biz News: Anonymous Sudan's Russia Links Are (Still) Obvious Microsoft confirms partial loss of security log data on multiple platforms | Cybersecurity Dive Risky Biz News: Apple wants to reduce the lifespan of TLS certificates to 10 days Encrypted Chat App ‘Session' Leaves Australia After Visit From Police Crypto platform Radiant Capital says $50 million in digital coins stolen following account compromises North Korean hackers use newly discovered Linux malware to raid ATMs - Ars Technica Brazil Arrests ‘USDoD,' Hacker in FBI Infragard Breach – Krebs on Security Here's how SIM swap in alleged bitcoin pump-and-dump scheme worked - Ars Technica Critical Veeam CVE actively exploited in ransomware attacks | Cybersecurity Dive FortiGate admins report active exploitation 0-day. Vendor isn't talking. - Ars Technica Hackers reportedly impersonate cyber firm ESET to target organizations in Israel The latest in North Korea's fake IT worker scheme: Extorting the employers
Season 23 of the Building Better Developers podcast kicks off with a focus on building better habits. The first episode covers a critical topic for developers and tech enthusiasts: security awareness. Hosted by Rob Broadhead and Michael Meloche, the episode stresses the need for vigilance. In today's rapidly evolving digital world, staying aware is more important than ever. A Shift Toward Actionable Advice The hosts emphasize that this season will be more actionable than ever. Unlike the last season that focused on the developer journey, Season 23 targets building better habits. These habits promote more effective and responsible development practices. Each episode will cover specific skills, tools, or behaviors. Developers will learn how to integrate these into their daily routines. Security awareness, the focus of this episode, is a vital habit. It directly impacts both personal and professional data security. Action Item: schedule at least 30 minutes to explore security awareness. Use a search engine to find security awareness tools or vendors, many of which offer free content or trial periods. This will help you stay updated on the latest scams and security threats. Why Security Awareness is Crucial Security threats are more common than ever. Phishing scams and social engineering are just a few hacker tactics. Hackers have many methods to exploit vulnerabilities. Rob explains that developers may feel confident spotting threats. However, even tech-savvy individuals can fall for well-executed scams. Security awareness isn't just for IT professionals; it's for everyone. Those in technical fields may assume they're immune, but they're not. Rob shares a story to illustrate the importance of security awareness. He received a suspicious email from what appeared to be a legitimate state tax office. At first, it seemed like a scam. After thorough research and contacting the organization, it turned out to be a valid notice. This example shows that, even when cautious, it's crucial to verify suspicious communications before taking action. Taking Security Awareness Seriously Instead of a daily habit challenge, Rob suggests scheduling regular security check-ins. He recommends doing this throughout the year. Set aside time every few months to review your security posture. This includes both personal and organizational security. These check-ins could involve: Updating passwords Reviewing email security alerts Exploring the latest security awareness tools or vendors Rob notes that many security awareness vendors offer free resources or trial periods. These vendors frequently update their content with the latest scam and threat information, making it easier to stay informed. He mentions well-known providers like KnowBe4, Mimecast, and INFOSEC. All of these offer accessible programs to help individuals and organizations stay current on emerging threats. Key Steps for Developers Michael offers valuable insights by suggesting developers use secure password managers like KeePass or LastPass. These tools help store credentials safely. He stresses the importance of regularly reviewing and updating passwords, especially for financial accounts. Michael warns against reusing passwords across different platforms. This common mistake can lead to widespread vulnerability if one account is compromised. Another key security tip is to use multi-factor authentication (MFA) whenever possible. Rob and Michael both agree that MFA provides an essential layer of protection. It helps prevent unauthorized access, even if login credentials are compromised. For businesses, Michael advises checking industry-specific security requirements to ensure compliance with regulations. This is especially important in sectors like healthcare and finance, where security breaches can have legal and financial consequences. The Role of Technology in Building Better Security Awareness Habits Developers are uniquely positioned to integrate security into their daily work. Whether implementing MFA in an app or securing dependencies with tools like OWASP, security should be a habit—not an afterthought. Rob emphasizes that even if security isn't your main focus, regular check-ins are essential. Ongoing education can help prevent security vulnerabilities from becoming serious issues. Rob shares additional resources for developers looking to improve their security practices. Tools like OWASP help developers identify and fix vulnerabilities in third-party dependencies, integrating security into the development process. For more structured programs, vendors like INFOSEC and NinjaO offer comprehensive security awareness training tailored for both businesses and developers. Final Thoughts The episode encourages developers to adopt security habits as part of their routine. Rob and Michael suggest starting with simple steps. Subscribe to security awareness vendors and set regular reminders for security reviews. Security awareness is an ongoing responsibility. Staying informed and vigilant protects both personal data and organizational systems. As Season 23 progresses, more practical advice will be shared. This guidance will help you build essential habits to enhance your career and safeguard your future. Stay Connected: Join the Developreneur Community We invite you to join our community and share your coding journey with us. Whether you're a seasoned developer or just starting, there's always room to learn and grow together. Contact us at info@develpreneur.com with your questions, feedback, or suggestions for future episodes. Together, let's continue exploring the exciting world of software development. Additional Resources Cybersecurity Best Practices Improve Security Awareness – Interview With Tyler Ward Organization Security Tips and Tricks Security Assessments – Find Your Vulnerabilities The Developer Journey Videos – With Bonus Content
As part of its global expansion plan, Integrity360 has acquired Grove Group, a longstanding cybersecurity and cloud services company headquartered in Cape Town, South Africa. The terms of the transaction were not disclosed. The acquisition provides Integrity360 with approx. 600 additional customers across 51 countries, a deep partnership with leading NDR (Network Detection and Response) vendor Darktrace, and another global SOC (Security Operations Centre) location, bringing the group's SOC locations to 5. Grove customers will benefit from access to Integrity360's extensive cyber services portfolio encapsulating cyber risk and assurance, cyber security testing, incident response, infrastructure, end-point, PCI compliance, and a highly comprehensive range of cyber security managed services including innovative XDR/MDR solutions. Integrity360's innovative range of services have been recognised four times in a Gartner market guide, most recently as a Representative Vendor for the second year running in the Gartner guide for Managed Detection and Response services. Grove, like Integrity360, has a long and deep history in cyber security and was founded in 2005, employs approx. 50 employees and is headquartered in Cape Town, South Africa with a regional office in London, UK. Grove has grown strongly over the last 5 years with a CAGR of over 22%, and during 2023 achieved sales of approx. €17m. Grove serves over 600 customers, across multiple countries and regions including the UK, Europe, Africa, the Caribbean, and Mauritius. Grove has developed deep and long standing relationships with several of the world's leading cyber security vendors including Darktrace, Proofpoint, ESET, and Mimecast. The combination of Grove with Integrity360 brings group annual revenues to approx. €130m (up from approx. €85m in 2022) and expands group resources to over 500 employees. Grove's technical support operations will serve as another SOC (Security Operations Centre) operation based out of Cape Town and will be combined with Integrity360's other four SOCs in Dublin, Sofia, Stockholm, and Naples - together operating with over 140 dedicated engineers, consultants and cyber experts in delivering a wide ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Grove's relationship and deep technical skills in Darktrace have led to the company winning the Darktrace partner of the year award for 3 consecutive years, and its innovative "dSOC" managed service for Darktrace technology is enabling a growing number of customers to optimise their investment in Darktrace AI driven threat detection and response technology. Grove's expertise in Darktrace solutions will add to that developed by Integrity360 following the partnership that it formed with Darktrace in early 2024. Ian Brown, Executive Chairman at Integrity360 commented: "We are delighted to be welcoming Grove to Integrity360. The enhanced group significantly expands our existing activities and cyber services across other continents including Africa and the Caribbean in addition to bolstering our existing markets throughout the UK and continental Europe. "The addition of another Integrity360 regional hub in Cape Town will further enable us to serve the local needs of customers, and the SOC will add to and expand our already considerable 24/7 SOC operations. Both companies share a passion for customer service and innovation and we look forward to offering the group's enhanced range of services to our collective customers and partners over the coming weeks and months." Pip Witheridge, Founder and Chairman of Grove commented: "I am delighted that Grove is joining Integrity360 and continuing the growth journey that we started some 19 years ago. Thanks to the support of our customers, partners and employees Grove has grown and flourished during that time and I am confident will continue to d...
This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denial of service robots All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-370
This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denial of service robots All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-370
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized network access? Why do we keep thinking that the next vendor offering is going to solve all our problems? In this interview, we talk with Fred Wilmot about the hard work of building effective processes and resilient architectures that will actually yield reductions in risk and detection/response capabilities that actually work. We'll discuss shifts in thinking that can move us past the latest distractions, and keep security teams focused on work that moves the needle. Fred may also mention his past transgressions against the industry and what he's doing to "wipe out the red from his ledger". There's plenty of content out there detailing how vendors fall short: scummy, aggressive sales tactics overuse of jargon and buzzwords sneaky sales tactics dumping on competitors products that fall far short of claims ambulance chasing So what should they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and mindsets of security researchers to improve GTM strategies, without resorting to awful tactics. Drawing from extensive experience in qualitative interviews and collaborations with enterprise security executives and researchers, Dani will uncover how the innate curiosity and analytical prowess of researchers can dismantle unhealthy habits within vendor organizations. We'll also discuss Dani's various projects, including the WTF Did I Just Read podcast, CyberNest, and CyberSynapse. Dani will explain how these are all designed to address the gap between vendors and buyers in the cybersecurity industry. This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denial of service robots All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-370
Remember 20 years ago? When we were certain SIEMs would grant our cybersecurity teams superpowers? Or 10 years ago, when we were sure that NGAV would put an end to malware as we knew it? Or 15 years ago, when we were sure that application control would put an end to malware as we knew it? Or 18 years ago, when NAC would put an end to unauthorized network access? Why do we keep thinking that the next vendor offering is going to solve all our problems? In this interview, we talk with Fred Wilmot about the hard work of building effective processes and resilient architectures that will actually yield reductions in risk and detection/response capabilities that actually work. We'll discuss shifts in thinking that can move us past the latest distractions, and keep security teams focused on work that moves the needle. Fred may also mention his past transgressions against the industry and what he's doing to "wipe out the red from his ledger". There's plenty of content out there detailing how vendors fall short: scummy, aggressive sales tactics overuse of jargon and buzzwords sneaky sales tactics dumping on competitors products that fall far short of claims ambulance chasing So what should they doing? In this episode, we chat with Dani Wolff, about how marketers can adopt the skills and mindsets of security researchers to improve GTM strategies, without resorting to awful tactics. Drawing from extensive experience in qualitative interviews and collaborations with enterprise security executives and researchers, Dani will uncover how the innate curiosity and analytical prowess of researchers can dismantle unhealthy habits within vendor organizations. We'll also discuss Dani's various projects, including the WTF Did I Just Read podcast, CyberNest, and CyberSynapse. Dani will explain how these are all designed to address the gap between vendors and buyers in the cybersecurity industry. This week, in the enterprise security news, over half a billion in funding, as everyone gets their pre-Blackhat announcements out! Mimecast picks up Code42 Will Cato Networks IPO? Canarytokens update We still have some crowdstrike fallout to discuss CISO responses to SEC rules Making things secure without security tools tips for going SOCLess denial of service robots All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-370
This week on Cyber Matters, Tanner Wilburn, Katherine Kennelly, and Zach Smith begin with Google's decision to end its plans to ban third-party cookies, discussing the implications for user privacy and online advertising. They then explore recent developments in the cybersecurity industry, including Google's failed acquisition of Israeli cybersecurity company Wiz and Mimecast's successful acquisition of Code 42. They also discuss Apple's warnings to Indian iPhone users about potential "mercenary spyware" attacks and the legal brief filed by major tech firms supporting a journalist targeted by NSO Group's spyware. They cover KnowBe4's inadvertent hiring of a North Korean hacker and the potential reporting obligations for companies following the recent Crowdstrike outages. The podcast also touches on the FTC's not-so-new guidance on hashing and anonymization, as well as their investigation into "surveillance pricing" practices. State privacy laws are discussed, with a focus on Colorado's universal opt-out shortlist and a recent BIPA decision regarding Samsung's face-scanning feature. The hosts also cover recent fines and settlements involving Meta, Oracle, and TracFone related to various privacy and data protection violations. If you enjoy the show, share and leave us 5 stars! Links from the show: https://www.linkedin.com/company/cyber-matters-podcast/ https://www.cooley.com/news/insight/2024/2024-07-22-sec-reporting-implications-for-publicly-traded-companies-impacted-by-crowdstrike-defective-software-update https://www.techtarget.com/whatis/feature/AI-lawsuits-explained-Whos-getting-sued https://www.lawfaremedia.org/article/lawfare-podcast-orin-kerr-and-asaf-lubin-apple-v-nso-group
Join us as we delve into the world of marketing with Archana Dhankar, a seasoned leader and influencer in the global marketing landscape. From her roots in digital marketing to crafting integrated campaigns that resonate internationally, Archana shares insights on brand storytelling, leveraging data analytics, and the future of marketing trends. 00:38- About Archana Dhankar Archana is a marketing leader, influencer, and content creator. She has formerly worked with Mimecast, Purplebricks, and EDB. --- Support this podcast: https://podcasters.spotify.com/pod/show/tbcy/support
As part of the 2024 iTnews State of Security report, iTnews speaks with Sandro Bucchianeri, Group Chief Security Officer at NAB.This episode of the iTnews podcast brought to you by Mimecast.We love to hear from our readers and advertisers, so please get in touch and let the friendly iTnews team help with your enquiry.
In this episode, Norman Guadagno, the CMO of Mimecast, discusses the intersection of marketing, leadership, and team dynamics with Gabe Cohen. Norman emphasizes the critical role of marketing in capturing attention and fostering resonance with customers, emphasizing the pivotal moment of engagement that opens doors to new opportunities. He also dives into the significance of pattern recognition in leadership, explaining how this skill can elevate individuals into more strategic roles by identifying cross-industry patterns. Don't miss this compelling discussion about marketing strategy, profound leadership insights, and the evolving landscape of brand management within the competitive cybersecurity sector. Tune in!
Today, we explore the alarming rise of image-based and QR code phishing that's outsmarting 76% of organizations, the ingenious tax-related scams preying on taxpayers and professionals alike, and a unique espionage case alongside a digital heist targeting cryptocurrency wallets. Discover the latest cybersecurity threats and learn how to safeguard your digital footprint against these evolving schemes. Your vigilance is your best defense in the digital age. Articles referenced: Image-Based Phishing: https://www.helpnetsecurity.com/2024/03/12/image-based-phishing-attacks/ Tax Scams: https://www.helpnetsecurity.com/2024/03/12/tax-scams/ Espionage in Russia: https://tass.com/society/1757911 Cryptocurrency Wallet Breach: https://thehackernews.com/2024/03/watch-out-these-pypi-python-packages.html Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags: cybersecurity, phishing attacks, tax scams, QR code scams, image-based phishing, tax filing deadline, IRS scams, espionage, cryptocurrency wallet, Python packages, digital security, cybercrime prevention, BIPClip operation, South Korean espionage, tax professionals, identity theft Search Phrases: How to avoid phishing scams Tax filing scams 2024 Latest IRS scams Protecting against QR code phishing Image-based phishing attacks Cybersecurity tips for tax season Cryptocurrency wallet security Espionage cases in Russia BIPClip Python package scam Safeguarding digital information Cybercrime trends in 2024 Security measures for tax professionals Preventing identity theft during tax season Digital defense against phishing Understanding cybersecurity threats Transcript: Mar 13 [00:00:00] announcer: Welcome to The Daily Decrypt, the go to podcast for all things cyber security. Get ready to decrypt the complexities of cyber safety and stay informed. Stand at the frontier of cyber security news, where every insight is a key to unlocking the mysteries of the digital domain. Your voyage through the cyber news vortex starts now. [00:00:29] offsetkeyz: Welcome back to the daily decrypt. Today, we're going to be talking about image-based. Phishing scams to include QR codes, but also just regular images. Highlighting a discovery that a staggering 76% of organizations find themselves in snared by image-based and QR code phishing. After that we're going to switch gears and talk about some tax time tricks, where the IRS flags down. New and classic scams as the tax deadline looms. We're also discussing the first ever. South Korean citizen. Has [00:01:00] been detained by Russia for espionage. As well as seven new Python packages that have been known to drain your crypto wallet. [00:01:13] offsetkeyz: Alrighty. So one of the most important hacks out there. Is called fishing and we're all hopefully very familiar with how that works. Clicking links in emails is the most classic way that people get phished. But attackers are starting to evolve. According to Osterman research, 93% of it, security professionals are aware of image-based phishing attacks, targeting their organizations. 70% of these organizations feel their current security stacks are effective against . Image-based QR code phishing attacks. Yet 76% were still compromised in the last 12 months, according to iron scales and Osterman research. So we've all heard of QR codes. It's essentially when you scan this weird digitized black and white [00:02:00] image and a link or a URL pops up in your camera, then you click on it and you go about your day. We all understand how that can be pretty malicious. You can hide links in there. They can make it look like you're going somewhere that you're not. Watch out for QR codes. What I didn't realize was going on as well, or what's called image based phishing scams. And those can range from. Injecting malicious code into a company's logo. Too. Images that look like plain text. So almost like a screenshot of text, but it's just an image. But when you click on these images, They redirect you to the malicious URLs, but those URLs are buried so deep in the images, metadata. That they bypass a lot of security measures. If the email is just containing an image that. Shows text that text, actually, isn't getting scanned. And thus bypassing its security checks. And if you're looking at your email and you're seeing text. Simply clicking to highlight [00:03:00] something. Can activate the URL in that image. So the best way to catch this is to have any sort of redirect protections in your email address, like Mimecast or something like that, where. It keeps it all. Self-contained in the app. There's nothing being downloaded. You're not allowed to redirect out. Maybe you're prompted once you click on something to say, Hey, is this where you're intending to go? Because this is where the link goes. But watch out, try not to click any images in your emails. [00:03:40] offsetkeyz: Tax day is looming. It's coming up in a few weeks. And we just wanted to talk a little bit about the scams that you might be seeing or will see as this deadline approaches. One of the toughest ones to spot is physical mail scams. They will look exactly like they came from the IRS. And they'll often [00:04:00] say. You are owed some sort of money from the IRS. Maybe in the form of an unclaimed refund. Or simply stating that you paid too much last year and we want to give you some money back. These are hard to. Spot, because this is a real type of mail that you could get. So I'm not going to tell you not to respond to this male. Just be cautious and verify that it's actually coming from the IRS. If you do reply to the mailing, ask for a contact number that you can call to verify. Maybe Google. Some of the verbiage that are found in these letters, maybe the address, the return address, Google, some of that stuff to see if it's. Actually going to the IRS or if it's going somewhere else. An extremely common scam is when taxpayers are getting calls from fake IRS agents. Often falsely accusing them of owing more tax. And. Creating a sense of urgency by describing the punishments that will come about. If they do not pay this [00:05:00] owed tax. On this one, it's really important to know that. The IRS will always initiate communication through the mail, which makes that previous scam harder to find. But anyone who's calling you from the IRS is immediately a scam. If you take nothing else away from this episode, know that you will never get a call from anyone from the IRS. On that note also keep an eye out for any sort of emails from the IRS. Like I said before, they will always initiate communications through the mail. And this fourth scam. You might not even know about, but. Scammers can take information that they found on you on the web or on the dark web, whether that be your address or your social security number or all these things, and actually file tax returns. For you just. Redirecting the return money to them. So it behooves you to file early, to try to get ahead of this. But keep an eye out. For any signs that your refund. Has gone to somebody else. If it has contact the IRS, maybe [00:06:00] even contact the FBI. If you are a tax professional, you are not exempt from these scams. One of the most common ones out there is. Fake taxpayers reaching out to you for your services. This will often be through email and it will be a phishing attempt. If you click any of the links. They could redirect to somewhere you don't want to be. They might also reach out asking for your electric filing identification number under the pretext of verification. But with the intent to hijack your identity and file fraudulent returns. All taxpayers. Should secure an identity protection pin from the IRS. And use only verified tax filing services. And only communicate personal information through encrypted channels. If possible, do most of your tax filing in-person with the tax professional? Or use TurboTax where. You're entering in your information in a web browser. Encrypted. And not sending things back and forth through mail or through email. Those are not the most secure forms of communication. There's a [00:07:00] lot of money to be had from. Tax returns. And fraudsters know that. So as much as I hate to say it and. Encouraged sticking to the big names, but those will be your safest bets. H and R block TurboTax. Places like that. [00:07:15] transition: Do, do, do, do, do, do, do, do. [00:07:21] offsetkeyz: And finally, we've got a quick lightning round for you. There are two stories here. One. Uh, south Korean national was caught in Russia's espionage net. Bake one soon, a south Korean citizen was arrested for espionage. Marking a first in Russia, South Korea relations. Now, this was reported by TASS. And it's marketed as a Russian news agency. And you can find the link to that in the show notes below. Bake Juan soon was transferred to Moscow for further investigation. After being identified, handing over classified information to foreign intelligence. The information that this individual handed over was classified as top [00:08:00] secret. Which reflects the sensitivity and potential diplomatic implication of the charges. Okay. And finally. In relation to yesterday's stories with the leather wallet. [00:08:09] offsetkeyz: The hacker news has identified. Seven Python packages. That if downloaded can drain your crypto wallets. This research comes from reversing labs. And it outlines these Python packages. Being designed to steal BIP 39 pneumonic phrases, which is critical for cryptocurrency wallet, recovery. These packages have been downloaded over 7,451 times. And our targeting developers specifically in the crypto wallet space. Like I said there are seven malicious packages. They will be listed in the show notes, but just to read them out, it's JS BIP 39 dash decrypt. BIP 39 pneumonic decrypt. Pneumonic to address and. Others. So if you're in the crypto wallet, development space, keep an eye out for these packages. And if you accidentally have [00:09:00] downloaded them, Please remove them. And. Um, probably transfer your crypto. Revoke all login sessions. And change that passcode. All right. So that's all we've got for you today. Keep an eye on those tax returns and we will talk to you some more tomorrow.
Mimecast, a company started by two South Africans is a global leader in cybersecurity specialising in advanced email and collaboration security. After trading on Nasdaq for six years, the company decided to go private in November 2015 in a $5.8 billion deal with Permira. In an interview with Biznews, co-founder and former CEO Peter Bauer shared his journey from being a school leaver who opted not to attend university to starting his first business with 'oceans behind the ears'. Bauer explained how he was “hell-bent on getting into tech” in the early 90s. He recounted how his first company, which he sold to Idion, built the first news factory for what later became News24. After the sale, Bauer moved to London where he met fellow South African techie Neil Murray and started Mimecast. According to Bauer, “he fell in love with the process of building a company.” Discussing his decision to step down as Mimecast's CEO, Bauer emphasised that it was the right time to hand over the reins, with the appointed CEO, Mark van Zadelhoff, being the ideal candidate. However, Bauer remains engaged by staying on the board. He also revealed his shift from technology to eco and social justice projects, expressing a desire to support entrepreneurs. Bayer shared that he bought a mountain in Cape Town “by accident.” Additionally, he offered valuable insights for new tech entrepreneurs and discussed the increasing challenges that generative AI will have in predominantly digital workplaces
Sasol hit by 34% decline in half-year profit Fleetwood Grobler, outgoing president and CEO at Sasol on the company's half-year profit plummeting by 34% due to weaker oil prices and higher costs, leading to a reduced dividend and a 5% fall in share value. New leadership: Marc van Zadelhoff, pearheads Mimecast's next chapter in cybersecurity Marc van Zadelhoff, new CEO of Mimecast on the technology company expanding. Jonathan Acutt to reveal secrets of 165-year real estate legacy on 'How I Make Money Jonathan Acutt, managing director at Acutts Real Estate on a family-owned real estate company with a 165-year legacy, joined us as our guest in How I Make Money. He shares insights on achieving longevity in the country's real estate sector.See omnystudio.com/listener for privacy information.
In this episode, Marc catches up with Mimecast CEO and co-founder Peter Bauer. They cover Peter's CEO journey, including what it was like growing up in South Africa, why he opted out of attending university, highlights from Mimecast's 20-year history, and what Peter learned from taking the company public — and then private again. You'll also learn: When and how to raise capital, and how to manage meeting the board's expectations. How CEOs can overcome self-doubt and continuously reimagine their role to look at challenges with new eyes. How to view the company's history as a story with chapters and eras, and why it's important to always believe you're at the beginning of the book.
Are you fascinated by the ever-changing landscape of cybersecurity? Curious about what it takes to manage risk in a digital world? This episode is right up your alley! Today we sit down with Norman Guadagno, the CMO of Mimecast, a company dedicated to transforming email and collaboration security for over 40,000 organizations. With a career spanning multiple sectors and roles, from being the founding member of CMO Huddles to serving as the first CMO at Acoustic, Norman has insights that you won't want to miss. What's Inside: How Mimecast is changing the game in email and cybersecurity. Norman's own career journey and the versatile roles he's mastered. What it takes to build an effective marketing organization in the tech sector. Bonus: Norman's unique "Boo-Boo Theory of Risk" unveiled! Why You Should Listen: Get an insider's look into the cybersecurity industry from a seasoned CMO. Understand the complexities of balancing risk and innovation. Discover actionable strategies for your own digital risk management. Tune in to unlock these insights and more, as we unravel the intricate web of cybersecurity, marketing, and leadership. Don't forget to bring your notepad; this episode is packed with value!
Discover how AI is set to revolutionize the B2B services economy and the implications for GDP. Plus, unravel the paradox of the cyber job market, explore the urgent need for a content source authentication system, and delve into the controversial practice of CVE farming
Drew Murphy nearly became a meteorologist. But he opted for a different type of forecasting, warning of impending storms as an FP&A professional. A fast-paced finance career saw him land a part role at Procter & Gamble (while studying)-his senior year saw him work 30 hours a week as a plant accountant. Following six years of FP&A at Procter & Gamble (including analysis for Gillette and Braun), he took roles at Vistaprint, Mimecraft (where he was central to their IPO) and a CFO gig. Drew then launched community FP&A Hey with his co-founder Yarty Kim. The mission of FP&A Hey is to “help time starved FP&A professionals get their free time back, their personal freedom back” offering resources and mentoring for FP&A professionals. Core to his career approach is a clear mantra: “Find best practices, find people that make you better, work on things you enjoy.” In this episode he discusses the implications of this approach to upgrading your career and work life balance in a busy finance role. In this episode: Drew's worst budgeting experience in his career Shaving forecasting with Gillette and Braun how to impress sales executives with quarterly sales performance analysis Best practice for a monthly profit forecast and team management process Why you need to be at a place with “people you respect and admire” The importance of relationships in finance How the IPO process felt like a “wedding” His strategic finance moment delivering (at Mimecast) growth of 40%, EBITDA expansion over time as a percentage of revenue Why FP&A pros must learn accounting and a business model Links from the Show FP&A Hey. Because they don't teach FP&A in school. Grow your skills, networks, and careers, all while having fun. How to impress sales executives with quarterly sales performance analysis: https://www.fpandhey.com/how-to-impress-executives-with-quarterly-sales-performance-analysis/ Contact Drew at Drew@fpandhey.com
In this episode of The Next CMO podcast, I speak to Norman Guadagno, the CMO of Mimecast. Since 2003, Mimecast has stopped bad things from happening to good organizations by enabling them to work protected. We empower over 40,000 customers to mitigate risk and manage complexities across a threat landscape driven by malicious cyberattacks, human error, and technology fallibility. Our advanced solutions provide proactive threat detection, brand protection, awareness training, and data retention capabilities evolving workplaces need today. Mimecast transforms email and collaboration security into the eyes and ears of organizations worldwide. Learn more about Norman GuadagnoLearn more about MimecastFollow Peter Mahoney on Twitter and LinkedInLearn more about Peter's company, AcceleratusLearn more about Planful for MarketingJoin The Next CMO CommunityRecommend a guest for The Next CMO podcastProduced by PodForte
In this insightful episode of Tech Talks Daily, Neil Clauson, Regional CISO at Mimecast, joins us to shed light on a subject that has now found a permanent place in boardroom agendas worldwide: cyber risk. The World Economic Forum's 2023 Global Risks Report has highlighted cyber risk as a top concern for global leaders, echoing the urgent need for board-level understanding and action in this domain. But how do CISOs make the complex world of cybersecurity comprehensible to the C-Suite and the board? Neil Clauson offers a masterclass. We explore the nuances of demystifying mid-to-long-term risks associated with cyber threats, urging the importance of language that resonates with the board. Gone are the days when technical jargon could dominate these high-level discussions. In today's interconnected business landscape, it's crucial that cyber risks are articulated in terms directly correlating with business outcomes. But it's not just about communicating what could go wrong; it's also about focusing on why it can go wrong. For instance, why does heavy reliance on a single security provider increase risk? The episode explores Clauson's recommendations for aligning cyber risk with the broader business landscape. By doing so, CISOs can move away from a crisis-response model to one that is integral to the business strategy, thereby elevating the cybersecurity discourse from a niche IT concern to a core business functionality. Neil Clauson also imparts wisdom on how to frame cyber risk without inciting unnecessary panic. He suggests tactical approaches that allow the board to quantify these risks accurately, driving home the point that not every incident warrants a five-alarm fire. Finally, we delve into the evolving role of the CISO, emphasizing the need for a sense of humor, preparedness, and proactive risk management strategies that go beyond mere compliance to embed cybersecurity into the very fabric of the business. This episode is a must-listen for CISOs grappling with the challenge of making cybersecurity a board-level priority and for board members looking to gain a nuanced understanding of this multifaceted risk landscape.
In this episode:
In this episode:
Check out this interview from the BSW VAULT, hand picked by main host Matt Alderman! This segment was originally published on June 8, 2020. Marc French has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role at CISO at Product Security Group, Marc was the SVP & Chief Trust Officer at Mimecast, Inc. and has held a variety of senior security roles at Endurance/Constant Contact, EMC/RSA, Iron Mountain, Digital Guardian, and Dun & Bradstreet. With all this security experience, Marc has created a series of career ladders to help guide infosec professionals with their job journey, including the illustrious CISO position. We will also cover whether you really want to be a CISO... All of the open source career ladders can be found here: https://github.com/product-security-group/Security_Ladders Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/vault-bsw-1
Phishing emails are constantly evolving to take advantage of current trends, news, and holidays. Typically poor grammar or the time an email was sent could help you identify if it is authentic. But with AI, these obvious signs may soon disappear. Today's guest is Kiri Addison. Kiri is the Detection and Efficacy Product Manager at Mimecast, working on security products to defend against new and evolving threats. Previously she was head of data science for threat intelligence and has worked in the public sector creating systems to detect and prevent cyber attacks and fraud. Show Notes: [0:59] - Kiri shares her background and what her role is at Mimecast. [3:03] - Email scams are still the number one attack method and they tend to follow trends, news, and holidays. [5:17] - Technology is improving and there is better protection of basic attacks, but with how fast threats evolve, there are still areas of improvement. [7:34] - Kiri shares some statistics on the improvement made after implementing phishing email training. [8:26] - With the use of ChatGPT, our usual red flags to look for will change. [10:12] - In the advice and training by Mimecast, they explain the impact on the end user. [12:08] - Kiri explains some of the different types of security measures available. [13:47] - A lot of companies only implement the training with their employees to check off the compliance. [16:50] - Be suspicious and take some time. Don't feel pressured. [20:05] - Look for anything abnormal, even if it is something unusual from a sender you know. [21:44] - If you receive word from someone you know but it seems odd, contact the person directly to find out what's going on. [23:10] - Mimecast works primarily with corporations and businesses, but there are some personal phishing email attempts. [24:44] - Some attacks combine safe sights with malicious links. [26:00] - Kiri describes some of the recent trends they are seeing. [28:58] - As AI evolves, it is going to become harder to protect. However, it all comes down to end user awareness. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Dr. Kiri Addison on LinkedIn Mimecast Website
Check out this interview from the BSW VAULT, hand picked by main host Matt Alderman! This segment was originally published on June 8, 2020. Marc French has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role at CISO at Product Security Group, Marc was the SVP & Chief Trust Officer at Mimecast, Inc. and has held a variety of senior security roles at Endurance/Constant Contact, EMC/RSA, Iron Mountain, Digital Guardian, and Dun & Bradstreet. With all this security experience, Marc has created a series of career ladders to help guide infosec professionals with their job journey, including the illustrious CISO position. We will also cover whether you really want to be a CISO... All of the open source career ladders can be found here: https://github.com/product-security-group/Security_Ladders Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/vault-bsw-1
In this enlightening episode of our podcast, we delve into the fascinating realm of Physics Informed Neural Networks (PINNs) and explore how they combine the extraordinary prediction capabilities of neural networks with the unparalleled accuracy of physics models. Join us as we unravel the mysteries behind PINNs and their potential to revolutionize various scientific and engineering domains. We'll discuss the underlying principles that enable these networks to incorporate physical laws and constraints, resulting in enhanced predictions and a deeper understanding of complex systems. Sponsors This episode is supported by Mimecast - the email security solution that every business needs. With Mimecast, you get a security solution that is specifically designed for email and workplace collaboration. Head to mimecast.com for a free trial. References Physics Informed Deep Learning https://maziarraissi.github.io/PINNs/
Check out this interview from the BSW VAULT, hand picked by main host Matt Alderman! This segment was originally published on June 8, 2020. Marc French has more than 25 years of technology experience in engineering, operations, product management, and security. Prior to his current role at CISO at Product Security Group, Marc was the SVP & Chief Trust Officer at Mimecast, Inc. and has held a variety of senior security roles at Endurance/Constant Contact, EMC/RSA, Iron Mountain, Digital Guardian, and Dun & Bradstreet. With all this security experience, Marc has created a series of career ladders to help guide infosec professionals with their job journey, including the illustrious CISO position. We will also cover whether you really want to be a CISO... All of the open source career ladders can be found here: https://github.com/product-security-group/Security_Ladders Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/vault-bsw-1
In this episode of Phishy Business, we bring you a special recording from the show floor at RSA Conference. Hosted by Mimecast's CMO Norman Guadagno, this episode delves into cyber insurance and how managing risk has had to adapt to the modern digital economy. You'll learn exactly what cyber insurance is, why it's important and how insurers should be trusted partners to organizations looking to better protect themselves from cyberattacks. Our special guests are Tara Bodden, Head of Claims and General Counsel, and Thom Dekens, Chief Business Officer & GM at At-Bay Cyber Insurance. Tara works to ensure a seamless customer experience for At-Bay clients who have filed a claim. She also works to unlock data insights that can protect clients, and heads up At-Bay's legal department which is charged with making sure At-Bay can deliver on its aspirations without doing harm. Thom heads up the cybersecurity side of At-Bay, ensuring the company and its clients are as secure as possible. Tara and Thom use their expertise to provide a look into the importance of cyber insurance in today's high-risk security environment. They explain how every company is a technology company and how a cyber insurance company can educate organizations on how they can protect themselves. They also provide insight on how a cyber insurance company can help when something goes wrong. In ‘Keeping Threats ‘At-Bay' – Normalizing Cyber Insurance as Part of Business', we discuss: How cyber insurance companies work with their customers to ensure they have the most effective security solutions in place. How cyber insurers are vital partners for SMBs needing improve their cybersecurity. How our guests made their way to the world of cybersecurity. The main threats At-Bay's clients see. At-Bay's Ranking Email Security Solutions report in which Mimecast was found to be the email security solution associated with the lowest number security incidents.
In this episode of Phishy Business, Mimecast CMO and guest host Norman Guadagno, chats to four different people at this year's RSA Conference in San Francisco. Our guests were interviewed in our very own podcast recording studio at the Mimecast booth. In part one of this two-part episode, we learn more about our guests' roles, their companies, and the cool things they're working on. We also discuss what was trending at this year's show and how the conference has evolved over the years. Did we mention ChatGPT? That was brought up once or twice too! Our guests for part one: Adrian Sanabria, podcast host of Enterprise Security Weekly, (1:14 – 13:30) Pam Cyr, vice president of technical partnerships at Palo Alto Networks (14:00 – 25:23), Michael Smith, CISO at HKS, Inc. (25:41 – 38:35) and Michiel Prins, co-founder and head of professional services at HackerOne (39:17 – 51:27). In ‘ChatGPT buzz + much more from the RSAC show floor' we discuss: The major trends from this year's conference How ChatGPT is being used now – and what the future could hold Technology partnerships and how they benefit organizations Cybersecurity resources to learn more about security and coding Why cybersecurity is a great field to go into
In this episode of Channel Voices, I sit down with Patrick Goedhart, Team Leader Channel Sales at Mimecast, to discuss the key elements of a successful channel partner onboarding strategy. Our guest also shares his experiences in implementing successful channel partner onboarding programs in the past and we dive into common challenges that arise during the onboarding process and best practices for addressing them.Patrick also shares insights on measuring the success of a channel partner onboarding program and ensuring that partners have the necessary resources and support to be successful.The importance of training and education in the onboarding process is also discussed, along with steps to build strong and lasting relationships with channel partners while allowing them to operate independently.We explore the importance of technology's role in the onboarding process, along with our guest's top tips for organizations looking to improve their partner onboarding strategies.Patrick's LinkedIn ProfileSupport the showThank you for tuning in to Channel Voices! If you appreciate this resource please consider supporting us. Thank you!To stay up to date follow us on LinkedIn and Twitter.You can of course contact us on our social channels or by visiting our website: www.ChannelVoices.comSubscribe to Channel Voices Scope, a monthly LinkedIn newsletter where we provide you with additional information accompanying the podcast. We hope you find this newsletter informative and useful for your career and organisation.We would also like to invite you to join our growing Channel Ecosystems Community on Twitter, a community of channel professionals exchanging ideas, sharing insights and learning from each other. Let's grow together!Until next time
In this episode of Phishy Business, we discuss some important ways to think about and look at risk and how its more about making decisions than assessing threats. Our special guest is Stefan Gershater, Director of Risk at Burberry. Stefan is a risk management expert, a biochemist, and a navy veteran. Stefan says that as a risk expert, he tries to make sense of uncertainty, which means he thinks a lot about how everyday decisions impact people and organizations. Stefan feels that when defining “risk”, it should be disassociated from the word “threat”, and simply be about making better decisions to improve outcomes. In ‘It's Time to Retire the Risk Management Profession', we discuss: How being in the royal navy shaped Stefan's understanding of risk The difference between risk in the navy and risk in a corporate setting Why Stefan thinks the risk management profession should be retired The importance of data in risk assessment How to communicate risk to stakeholders Mental health in the workplace About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic? For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/60 Selected reading. Traffers and the growing threat against credentials (Outpost24 blog) WiFi protocol flaw allows attackers to hijack network traffic (BleepingComputer) Cross-chain bridge attacks. (CyberWire) 2023 Annual State of Email Security Report (Cofense) From Ukraine to the whole of Europe:cyber conflict reaches a turning point (Thales Group) Russia Ramps Up Cyberattacks On Ukraine Allies: Analysts (Barron's) Pro-Russian hackers shift focus from Ukraine to EU countries (Radio Sweden) Russian hackers attack Slovak governmental websites after country supplies Mig-29s to Ukraine (Ukrainska Pravda) Ukraine's Defense Ministry says Russia is encouraging online piracy (The Jerusalem Post)
In this episode of Phishy Business, we discuss career coaching, looking at what it is, and how it can benefit all professionals, including those in the cybersecurity space. We delve into the differences between coaching and mentoring and discuss what to expect when working with a career coach. Our special guests are executive coach and mentor Fiona Anderson, and Dr. Kiri Addison, Senior Product Manager at Mimecast. Fiona is a change catalyst who works with professionals from all sectors with a particular focus on culture change. Fiona loves working with people to help them become the best versions of themselves. Kiri is a senior product manager and all-around cybersecurity expert who recently won a Most Inspiring Women in Cyber award and worked with Fiona on her own career development. In ‘Understanding More About Career Coaching', we discuss: The difference between coaching and mentoring Recognizing that there may be career ceilings of our own making How different personalities and even gender identity can lead to different perspectives How the career coaching process works and key things to insist on, such as confidentiality The importance of knowing your own values What Kiri got out of the coaching process Tips to combat stress and burnout, a major issue in the cybersecurity sector About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
Natural language processing AI will be at the forefront in 2023, as it will enable organizations to better understand their customers and employees by analyzing their emails and providing insights about their needs, preferences or even emotions. As AI voice cloning technology becomes more powerful and readily available, we will see an increase in impersonation attacks that utilize audio deepfakes. Join Dr. Kiri Addison, Threat Detection and Efficacy Product Manager, Mimecast to discuss how you can prepare and protect your organization from these types of business email compromises with the right cybersecurity products that can effectively protect them against attacks like these. This segment is sponsored by Mimecast. Visit https://securityweekly.com/mimecast to learn more about them! In this week's leadership and communications segment, we discuss overemphasizing metrics, delegation drawbacks, security culture starts at the top, and succeeding in security with economic insecurity. Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/bsw297
In this episode of Phishy Business, we discuss what can be a very scary side of AI – when bots start thinking for themselves. We delve into some examples of this actually happening, but also look at the good AI is providing humankind. Our special guest is Mo Gawdat, former chief business officer at Google X and bestselling author of the books Solve for Happy and Scary Smart. Mo describes himself as having two lives – a first life as a “maker” who coded, built robots, and developed technology, and a second life following a personal tragedy, as an author, podcaster, and “thinker” who analyzes things that tend to be overlooked by others. Mo spends much of his time championing the importance of happiness and acceptance of events we cannot change. Mo also has a lot to say about the similarity between developing AI and raising children. Mo believes that one day AI will become more intelligent than humans and that we need to prepare now to coexist with AI. In ‘Scary Smart AI? Or the Potential to Be a Force for Good?', we discuss: Why AI could be scary, but also, why it could be good for humankind How raising AI is similar to parents raising children Why AI is humanity's biggest opportunity The potential for AI to develop emotions and consciousness When AI becomes smarter than humans and what the implications could be How Mo stays happy as explained in his book Solve for Happy About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
Natural language processing AI will be at the forefront in 2023, as it will enable organizations to better understand their customers and employees by analyzing their emails and providing insights about their needs, preferences or even emotions. As AI voice cloning technology becomes more powerful and readily available, we will see an increase in impersonation attacks that utilize audio deepfakes. Join Dr. Kiri Addison, Threat Detection and Efficacy Product Manager, Mimecast to discuss how you can prepare and protect your organization from these types of business email compromises with the right cybersecurity products that can effectively protect them against attacks like these. This segment is sponsored by Mimecast. Visit https://securityweekly.com/mimecast to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw297
We Hack Purple Podcast Episode 67 with Jeremy VenturaIn this episode of the We Hack Purple podcast host Tanya Janca met with Jeremy Ventura of ThreatX, to discuss how we can help more people from underrepresented groups into tech and specifically into the field of Cybersecurity / InfoSec. How do we get them a seat at the table? How can we share knowledge and educate people en mass? Can we advocate for others? (Spoiler alert: Jeremy and I gave several examples of both sides of that equation) We talked about “Saying yes more often!” when we are asked to do something a bit outside our comfort zone, if it might bring us new opportunities. We talked about imposter syndrome, different learning styles, and that you can come from any career, education or background, and there's a place for YOU in our field!Jeremy also shared some links and events too!ThreatX Cyber 101 Event! March 23, 2023The ThreatX blogJeremy's LinkedIn#CyberMentoringMondayEXploring Cyber Security - web cast Date unknown - early MarchArticle about #CyberMentoringMonday, read here: Article about mentoring and advocacyJeremy's Bio:Jeremy Ventura is a cybersecurity professional, specializing in advising organizations on information security best practices. He has years of experience in vulnerability management, email security, incident response and security center operations. At ThreatX, he is responsible for the development and presentation of thought leadership across all areas of cybersecurity. Ventura is an industry leader that can regularly be seen in media, blog posts, podcasts and at speaking events. Previously, Ventura worked at Gong, Mimecast, Tenable and IBM, among other security organizations. Ventura holds a Master's Degree in Cybersecurity and Homeland Security.Very special thanks to our sponsor: The Diana Initiative!The Diana Initiative Is: A diversity-driven conference committed to helping all underrepresented people in Information Security. This year the theme is “Lead the Change.”The Diana Initiative is seeking sponsors for their annual event happening Monday August 7, 2023 in Las Vegas - https://www.dianainitiative.org/sponsor/ for more informationThe Diana Initiative Call For Presentations opens on March 1, if you have a topic you want to share submit at tdi. https://tdi.mobi/CFPJoin We Hack Purple!Check out our brand new courses in We Hack Purple Academy. Join us in the We Hack Purple Community: A fun and safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter for even more free knowledge! You can find us, in audio format, on Podcast Addict, Apple Podcast, Overcast, Pod, Amazon Music, Spotify, and more!
In this episode of Phishy Business, we discuss the idea of Work Inspired, a corporate culture where employees all love to work because it turns out that happy employees are very good for business. Our special guest is Aron Ain, award-winning, retired CEO of UKG, formerly known as Kronos. Aron now serves as Executive Chair of the UKG Board of Directors and is also the author of Work Inspired, a book that depicts an inspiring example of what's possible in shaping corporate culture. Aron transformed his company's culture at Kronos, building a billion-dollar business. Aron truly believes that great organizations are powered by great people and that great people build better products, services, and outcomes. He also believes the biggest challenge in building such an organization is creating an engaging environment where people feel wanted and valued. We also discuss how Aron's leadership style and authenticity were key weapons when his organization fell victim to a cyberattack. In ‘Work Inspired – What's Possible in Shaping Corporate Culture', we discuss: · How employees are a powerful strategic weapon in any organization. The concept of being an ‘unleader' and the importance of humility – how you don't need to throw your title around and be forceful to get things done. Being conscious of being authentic. How Aron handled the COVID-19 pandemic as a leader. Aron's views on the future of work. The importance of transparency and overcommunication when dealing with a cyberattack. Why organizations often aren't transparent in the event of a cyberattack. How Aron's values showed up in his people during the attack. About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
Renegade Thinkers Unite: #2 Podcast for CMOs & B2B Marketers
How can B2B CMOs optimize their digital marketing efforts? Tune into this insight-packed episode with CMOs Ellina Shinnick of HUB International, Mika Yamamoto of F5, and Norman Guadagno of Mimecast as they share their approaches to digital spend—what's worked, what hasn't, and where they're focusing when it comes to building brand awareness online. Don't miss it! For full show notes and transcripts, visit https://renegade.com/podcasts/ To learn more about CMO Huddles, visit https://cmohuddles.com/
In this episode of Phishy Business, we discuss the very definition of ransomware and how it can be an overused and underdefined concept. We also take a closer look at the world of threat research. Our special guest is former professional hacker Charl van der Walt, Head of Security Research at Orange CyberDefense, who now spends his time asking and answering the important questions around cybersecurity, specifically those that pertain to ransomware. Charl believes we need to move beyond the term ransomware and look more at the concept of cyber extortion because the days of one-off ransomware attacks have given way to a massive, highly profitable, well-organized cyber-crime industry. Charl is working to ensure cybersecurity professionals look at ransomware more in terms as being part of a series of crimes in which security is breached and then something of value is taken and held for ransom. This is because ransom attacks are moving beyond just denial of access to data and are more frequently including confidential data exposure and denial of service in some form. In ‘Cyber Extortion – The Next Evolution of Ransomware', we discuss: Redefining the term “ransomware” as “cyber extortion”. Why cyber extortion is now a much more appropriate term for security professionals to use. The main categories of threats in cybersecurity. The trends in ransomware over the past few years that have led to its transformation. How to effectively communicate about ransomware to a non-technical audience. The work communities can do to prevent ransomware attacks, known as ecosystem-based security. About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
What keeps the cyber C-Suite up at night? What are their main priorities, and how do they articulate them to board? In this session, we'll go behind the screens and find out what CISOs from all over the world really think in terms of making turning cyber risk into business risk. This segment is sponsored by Mimecast. Visit https://securityweekly.com/mimecast to learn more about them! In the leadership and communications section, Why CISOs Make Great Board Members, Unlock Your Leadership Potential: 12 Must-Read Books to Take Your Skills to the Next Level, How To Get People To Listen To You, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show Notes: https://securityweekly.com/bsw292
What keeps the cyber C-Suite up at night? What are their main priorities, and how do they articulate them to board? In this session, we'll go behind the screens and find out what CISOs from all over the world really think in terms of making turning cyber risk into business risk. This segment is sponsored by Mimecast. Visit https://securityweekly.com/mimecast to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw292
In this episode of Phishy Business, we discuss how cybersecurity marketing, sales, and support are for the most part inadequate, and how there can be a big disconnect between how marketers market and how technology professionals buy. We talk more about how marketing should consider the customer experience and how marketing departments should not only market their products and services but should also be active listeners and understand what their buyers need and want. Our special guest is cybersecurity marketing expert and podcaster Dani Woolf, who spent the past decade running high impact marketing departments for technology startups. She has since started Audience 1st to help cybersecurity vendors understand what CIOs and CISOs really want from them. Dani helps cybersecurity marketers better understand their buyers so they can sell more. In ‘Marketing as Customer Experience – Be an Active Listener', we discuss: How cybersecurity can help solve very complex problems. Vendors should have a ‘mission over money' mindset. Some traditional demand- and lead-gen techniques that don't work with a cybersecurity audience. Why CISOs tend to be a more cynical and less trustworthy audience, which is understandable because of the high stakes and stressful nature of the job. Co-creating with influencers who have polarizing opinions in the market is a good strategy in cybersecurity marketing. How the cybersecurity community values concise and clear content. The fact that technology leaders want marketing to be authentic and to cut through the ‘noise'. The mass over use of buzzwords that is all too common and alarming in the sector. How the cybersecurity community is open to giving feedback and taking feedback and how not a lot of vendors take advantage of this. That in order to be successful, marketing mindset needs to shift from product first to customer first. About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
Host Dr. Nick van Terheyden aka Dr. Nick, discusses Raising Red Team Thinking in Healthcare with Neil Clauson, Regional CISO at Mimecast. Their discussion includes unique challenges that healthcare faces in securing its attack surface, balancing what is possible with what is practical, the bad actors follow the money, like everyone else and there is a lot of money in healthcare for cybercriminals medical data have high value and attractive target. Plus good, better, and best cybersecurity and cyber hygiene. To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
In this episode of Phishy Business, we honor and recognize the value of the work of those professionals who spend their days defending people and organizations from cyberattacks by taking a close look at one of the biggest problems the industry faces today: worker burnout and the associated mental health issues. Join us as we discuss how while many of us say we are simply “fine” when someone asks how we are, we may, in fact, actually be suffering silently from stress and burn out. Our special guest is cybersecurity expert Peter Coroneos, Founder and Executive Chairman of Cybermindz.org, an organization that recognizes that many cybersecurity professionals are themselves under sustained and increasing stress and sets out to provide direct support to restore and rebuild emotional and cognitive health. Peter has worked in cybersecurity for a long time and was once head of the Internet Industry Association in Australia which gave him special and early insight into how cybersecurity workers can suffer from on-the-job stress. With cybersecurity professionals suffering more and more from stress and burnout, Peter is working to develop and deploy programs that are designed to help. In ‘Cybermindz – Hope in a Burnt-Out Sector', we discuss how: Stressed-out security teams make companies less secure. Hope and reinvigoration through a proven relaxation protocol is the aim of Cybermindz. The brain is not designed for constant periods of stress. The brain can't distinguish between a physical and psychological threat – and how in cybersecurity teams there is a constant sense of being under attack. In preliminary findings, CISOs are polling worse than frontline healthcare workers on their sense of efficacy and ‘doing a good job'. Through research, connecting the dots between cyber teams' mental health and an organization's cybersecurity posture is paramount to bring this issue to the forefront. The huge skills gap is making it impossible to simply throw more resources at the problem. It is a holistic issue, meaning that the skills gap needs to be filled and corporate culture needs to be improved before we see some improvement in CISO burnout. About Phishy Business Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it's social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast's very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts. www.mimecast.com
Over 90% of all cyber attacks start with a phishing email to an unsuspecting victim. As cyber criminal techniques become more sophisticated, how can businesses keep their communication channels safe? On this episode, David Raissipour, Chief Technology and Product Officer at the cloud-based cybersecurity company Mimecast, discusses the importance of cyber protection education and shares how his engineering team innovates to give businesses the upper hand over cyber threats.Tune in to learn:The importance of cybersecurity education (07:11)How Mimecast innovates for new kinds of cyber crime (13:56)How the current economy is impacting the cybersecurity industry (28:01)The demand for cybersecurity jobs (33:20)Mentions:“Closing the Cybersecurity Skills Gap” (IT Visionaries podcast; Episode 425)IT Visionaries is brought to you by Salesforce. With Salesforce's low-code app dev tools, you can be more efficient, more productive and save money by reducing development time by up to 90%. Get Salesforce's Low-Code Playbook and increase time to value for your team and your customers. Download the free playbook today.Mission.org is a media studio producing content for world-class clients. Learn more at mission.org
The customer is furious – and now you have to talk to them. It's not ideal, but it's a common situation for anyone working on customer success. So what's the best way to handle it? That's something Alice Jeffery, a customer success manager at Mimecast, a cloud cybersecurity based in London, has put a lot of time and thought into. After years of research, she has put together a great game plan for how CSMs can best approach irate customers. And thankfully, she's just shared her insights with UpdateAI's Josh Schachter on the latest episode of “[Un]churned.” Listen to the full episode to hear how CSMs can harness their emotions to help angry customers a) calm down and b) accomplish their desired goals“Emotion is very important in business – no matter what industry you're dealing with.” Alice Jeffery.
IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there's help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing software supply chain risks with SBOMs. Our guest is Elaine Lee from Mimecast discussing the pros and cons of AI in cybersecurity. And Why so much attempted DDoS, but not so much ransomware? For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/143 Selected reading. IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High (IBM Newsroom) Cost of a Data Breach Report 2022 (IBM Security) Netskope Threat Research: Data Sprawl Creating Risk for Organizations Worldwide as Personal App Use in Business Continues to Rise (PR Newswire) Financial Incentives May Explain the Perceived Lack of Ransomware in Russia's Latest Assault on Ukraine (Council on Foreign Relations) Tessian | 1 in 3 Employees Do Not Understand the Importance of Cybersecurity at Work, According to New Report (RealWire)